389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
{ "binaries": [ { "binary_version": "1.3.4.9-1ubuntu0.1~esm1", "binary_name": "389-ds" }, { "binary_version": "1.3.4.9-1ubuntu0.1~esm1", "binary_name": "389-ds-base" }, { "binary_version": "1.3.4.9-1ubuntu0.1~esm1", "binary_name": "389-ds-base-dev" }, { "binary_version": "1.3.4.9-1ubuntu0.1~esm1", "binary_name": "389-ds-base-libs" } ] }
{ "binaries": [ { "binary_version": "1.3.7.10-1ubuntu1+esm1", "binary_name": "389-ds" }, { "binary_version": "1.3.7.10-1ubuntu1+esm1", "binary_name": "389-ds-base" }, { "binary_version": "1.3.7.10-1ubuntu1+esm1", "binary_name": "389-ds-base-dev" }, { "binary_version": "1.3.7.10-1ubuntu1+esm1", "binary_name": "389-ds-base-libs" }, { "binary_version": "1.3.7.10-1ubuntu1+esm1", "binary_name": "python3-dirsrvtests" }, { "binary_version": "1.3.7.10-1ubuntu1+esm1", "binary_name": "python3-lib389" } ] }